A Taxonomy of Internal Attacks in Wireless Sensor Network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32795
A Taxonomy of Internal Attacks in Wireless Sensor Network

Authors: Muhammad R Ahmed, Xu Huang, Dharmendra Sharma

Abstract:

Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health sector, etc. Due to the intrinsic nature of the network and application scenario, WSNs are vulnerable to many attacks externally and internally. In this paper we have focused on the types of internal attacks of WSNs based on OSI model and discussed some security requirements, characterizers and challenges of WSNs, by which to contribute to the WSN-s security research.

Keywords: Wireless sensor network, internal attacks, security, OSI model.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1076534

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2977

References:


[1] X, Huang, M, Ahmed, D, Sharma, "The node became compromised when an attacker gain control of the node that acts as a legitimate node, after network deployment", 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. October 2011 Melbourne, Australia
[2] Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a survey," IEEE Communications Surveys & Tutorials, 3rd Quarter 2008.
[3] K. Lu et al., "A Framework for a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks", IEEE Transactions on Wireless Communications, vol. 7, no. 2, Feb. 2008, pp. 639-647.
[4] https://www.eol.ucar.edu/rtf/facilities/isa/internal/CrossBow/DataSheets /mica2.pdf,
[accessed on November 24, 2011]
[5] http://sentilla.com/files/pdf/eol/Tmote_Mini_Datasheet.pdf,
[accessed on November 24, 2011].
[6] O. E. Ochirkhand, M. Marine, V. Fabrice and K. Apostotlos, "Resiliency of Wireless Sensor Networks: Definitions and Analyses", 17th international conference on Telecommunications 2010.
[7] S. K. Singh, M. P. Singh, and D. K. Singh, "A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks", International Journal of Computer Trends and Technology- May to June Issue 2011
[8] T. G. Lupu "Main Types of Attacks in Wireless Sensor Networks" International Conference in Recent Advances in Signals and Systems 2009, ISSN: 1790-5109, ISBN: 978-960-474- 114-4.
[9] M.Y. Hsieh, Y. M. Huang, "Adaptive Security Modules in Incrementally Deployed Sensor Networks", International Journal on Smart Sensing and Intelligent Systems, vol. 1, no. 1, March 2008
[10] K. Sharma, M. K. Gosh, "Wireless Sensor Networks: An Overview on its Security Threats", IJCA Special Issue on Mobile Ad-hoc Networks MANETs, 2010.
[11] H. K. D. Sharma, A. Kar, "Security Threats in Wireless Sensor Networks", Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International.
[12] H. Ghamgin, M. S. Akhger, M. T. Jafari, Z. Branch, "Attackes in wireless sensor networks", Australian journal of Basic and applied Sciences, 2011.